The Complete Cyber Security Course Hackers Exposed!

Categories:Cyber Security
Course preview
5 Free Lessons

Upgrade to Pro for full access

What's included
Certificate of completion
Sign In to Start Learning

Create an account to access all courses

Welcome and Introduction to the Instructor!
2:06
Security Quick Win!
11:59
Goals and Learning Objectives - Volume 1
2:30
Target Audience
1:54
Study Recommendations
5:16
Course updates
00:40
Cyber Security and Ethical Hacking Careers
3:45

Theory and Practical
1:08
Goals and Learning Objectives
00:41
Protect What You Value
4:37
What is Privacy, Anonymity and Pseudonymity
4:35
Security, Vulnerabilities, Threats and Adversaries
4:37
Asset Selection
3:21
Threat Modeling and Risk Assessments
7:51
Security vs Privacy vs Anonymity - Can we have it all
1:56
Confidentiality, Integrity and Availability - (Security Attributes)
9:22
Defense In Depth
1:36
The Zero Trust Model
3:40

Goals and Learning Objectives
00:43
Why You Need Security – The Value Of A Hack
5:14
The Top 3 Things You Need To Stay Safe Online
1:23
Security Bugs and Vulnerabilities - The Vulnerability Landscape
9:35
Hackers, crackers and cyber criminals
2:32
Malware, viruses, rootkits and RATs
6:52
Spyware, Adware, Scareware, PUPs & Browser hijacking
4:44
What is Phishing, Vishing and SMShing
15:06
Spamming & Doxing
3:15
Social engineering - Scams, cons, tricks and fraud
5:31
CPU Hijackers - Crypto Mining Malware and Cryptojackers
8:42
Darknets, Dark Markets and Exploit kits
8:01
Governments, spies and secret stuff part I
5:13
Governments, spies and secret stuff part II
10:35
Regulating encryption, mandating insecurity & legalizing spying
14:37
Trust & Backdoors
10:14
Censorship
2:24
Cyber Threat Intelligence – Stay Informed
1:12

Goals and Learning Objectives
00:24
Symmetric Encryption
9:54
Asymmetric Encryption
10:17
Hash Functions
6:32
Digital Signatures
4:45
Secure Sockets Layer (SSL) and Transport layer security (TLS)
13:26
SSL Stripping
12:02
HTTPS (HTTP Secure)
7:00
Digital Certificates
6:21
Certificate Authorities and HTTPS
14:07
End-to-End Encryption (E2EE)
1:57
Steganography
8:12
How Security and Encryption is Really Attacked
2:42

Goals and Learning Objectives
00:28
Introduction to Setting up a Testing Environment Using Virtual Machines
10:01
Vmware
10:55
Virtual box
12:10
Kali Linux 2018
4:11

Goals and Learning Objectives
00:37
Security Features and Functionality
5:56
Security Bugs and Vulnerabilities
5:31
Usage Share
5:01
windows 10 - Privacy & Tracking
6:08
Windows 10 - Disable tracking automatically
4:42
Windows 10 - Tool Disable Windows 10 Tracking
8:14
Windows 10 – Cortana
3:00
Windows 10 – Privacy Settings
9:40
Windows 10 - WiFi Sense
4:16
Windows 7, 8 and 8.1 - Privacy & Tracking
7:19
Mac - Privacy & Tracking
4:28
Linux and Unix “like” Operating systems
3:30
General Use Operating Systems (Windows, MacOS and Linux)
4:09
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
5:04
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
2:55
Anonymity Focused Operating Systems (Tails and Whonix OS)
2:56
Penetration Testing and Ethical Hacking Focused Operating Systems
00:49
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
2:31
Linux - Debian 8 Jessie - Virtual box guest additions Issue
6:26

Goals and Learning Objectives
00:25
The Importance of Patching
3:47
Windows 7 - Auto Update
1:15
Windows 10 - Auto Update
1:25
Windows 10 - Auto Update
1:25
Windows - Criticality and Patch Tuesday
3:46
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
8:34
Linux - Debian - Patching
10:58
Mac - Patching
6:58
Firefox - Browser and extension updates
4:23
Chrome - Browser and extension updates
1:13
IE and Edge - Browser and extention updates
00:46
Auto updates - The Impact to privacy and anonymity
1:41

Goals and Learning Objectives - Removing Privilege
2:53
Windows 7 - Not using admin
3:32
Windows 8 and 8.1 - Not using admin
4:15
Windows 10 - Not using admin
3:25

Goals and Learning Objectives
00:26
Information Disclosure and Identity Strategies for Social Media
12:34
Identify Verification and Registration
5:05
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
7:51
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
10:22
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
5:02

Goals and Learning Objectives
00:21
Security Domains
10:00

Goals and Learning Objectives
00:37
Introduction to Isolation and Compartmentalization
2:10
Physical and Hardware Isolation - How to change the Mac Address
7:10
Physical and Hardware Isolation - Hardware Serials
11:18
Virtual Isolation
8:36
Dual Boot
2:41
Built-in Sandboxes and Application Isolation
3:07
Windows - Sandboxes and Application Isolation
5:57
Windows - Sandboxes and Application Isolation - Sandboxie
11:29
Linux - Sandboxes and Application Isolation
3:04
Mac - Sandboxes and Application Isolation
6:34
Virtual Machines
10:51
Virtual Machine Weaknesses
10:31
Virtual Machine Hardening
9:15
Whonix OS - Anonymous Operating system
20:51
Whonix OS - Weaknesses
4:18
Qubes OS
19:07
Security Domains, Isolation and Compartmentalization
4:42

Congratulations
00:58
Certificate Of Completion for CPEs
00:56
Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
16:23
Sample from Vol 2 - Password cracking part 2
7:09
Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
15:21
Sample from Vol 4 - Email clients, protocols and authentication
13:17

BONUS
Course preview
5 Free Lessons

Upgrade to Pro for full access

What's included
Certificate of completion
Sign In to Start Learning

Create an account to access all courses